{"id":31134,"date":"2016-12-12T19:41:17","date_gmt":"2016-12-13T00:41:17","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/hp-secure-encryption-hpe.php"},"modified":"2016-12-12T19:41:17","modified_gmt":"2016-12-13T00:41:17","slug":"hp-secure-encryption-hpe","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/hp-secure-encryption-hpe.php","title":{"rendered":"HP Secure Encryption | HPE"},"content":{"rendered":"<p><p>      Do you need to deal with data privacy challenges? Are you      worried about meeting compliance regulations? HP Secure      Encryption helps you accomplish this with data encryption      keys to secure your sensitive data at rest. HP Secure      Encryption is available for both local and remote      deployments. Local Key Management mode provides a single      server deployment. Remote Key Management mode allows for      central management for enterprise-wide deployment. Both Local      Key Management mode and Remote Key Management mode requires      the HP Smart Storage Administrator (SSA) version 1.60.17.0 or      later, Smart Array Px3x controllers or later, and Smart Array      firmware version 1.50 or later. For Remote Key Management      mode, the HP Enterprise Secure Key Manager (ESKM) 3.1 or      later manages all the keys and will help you scale to over      25,000 servers and millions of keys.    <\/p>\n<p>      Broad Encryption Coverage    <\/p>\n<p>      HP Secure Encryption encrypts the data on both the attached      bulk storage and cache module of the HP Smart Array Px3x      controller. It supports any hard disk drive or Solid State      Drive in the Smart Drive portfolio for HP ProLiant Gen8      Servers (or later) or supported storage enclosures.    <\/p>\n<p>      High Availability and Scalability    <\/p>\n<p>      HP Secure Encryption easily scales with your business from      single server deployment to enterprise-wide deployment of      over 25,000 servers via the HP Enterprise Secure Key Manager      (ESKM) 3.1 or later. ESKM manages all the keys centrally and      when deployed in a clustered configuration, it maximizes      uptime.    <\/p>\n<p>      Simplified Deployment and Management    <\/p>\n<p>      The HP Smart Storage Administrator configures the      cryptographic features of HP Secure Encryption associated      with the HP Smart Array Px3x or later controllers. Although      an activation key is not required to enable the features, a      license is required per encrypted drive.    <\/p>\n<p>      The ESKM manages all the keys across all HP Secure Encryption      deployments.    <\/p>\n<p>      Support compliance requirements like HIPAA and Sarbanes-Oxley    <\/p>\n<p>      HP Secure Encryption helps enterprises comply with data      privacy requirements associated with HIPAA and Sarbanes-Oxley      Acts.    <\/p>\n<p>      HP ESKM version 3.1 has achieved FIPS 140-2 Level-2      validation.    <\/p>\n<p>      HP has applied for FIPS 140-2 Level-2 validation for the      Smart Array Px3x family of Controllers and is currently      listed on the NIST pending site.    <\/p>\n<p>      HP has completed FIPS 140-2 Level 2 certification # 2735. HP      has applied for FIPS 140-2 Level1 validation for the HP Smart      Array Px4x family of controllers and is currently listed for      FIPon the NIST pending site.    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Follow this link:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.hpe.com\/us\/en\/product-catalog\/detail\/pip.6532260.html\" title=\"HP Secure Encryption | HPE\">HP Secure Encryption | HPE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Do you need to deal with data privacy challenges? Are you worried about meeting compliance regulations? HP Secure Encryption helps you accomplish this with data encryption keys to secure your sensitive data at rest<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-31134","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31134"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=31134"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31134\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=31134"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=31134"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=31134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}